{"id":"https://openalex.org/W2134596443","doi":"https://doi.org/10.1155/2014/649392","title":"BeTrust: A Dynamic Trust Model Based on Bayesian Inference and Tsallis Entropy for Medical Sensor Networks","display_name":"BeTrust: A Dynamic Trust Model Based on Bayesian Inference and Tsallis Entropy for Medical Sensor Networks","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2134596443","doi":"https://doi.org/10.1155/2014/649392","mag":"2134596443"},"language":"en","primary_location":{"id":"doi:10.1155/2014/649392","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/649392","pdf_url":"https://downloads.hindawi.com/journals/js/2014/649392.pdf","source":{"id":"https://openalex.org/S96783963","display_name":"Journal of Sensors","issn_l":"1687-725X","issn":["1687-725X","1687-7268"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Sensors","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/js/2014/649392.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101675076","display_name":"Gao Yan","orcid":"https://orcid.org/0000-0002-0206-2833"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yan Gao","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","Zhengzhou Institute of Information Science and Technology, Zhengzhou 450002, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","institution_ids":[]},{"raw_affiliation_string":"Zhengzhou Institute of Information Science and Technology, Zhengzhou 450002, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027449556","display_name":"Wenfen Liu","orcid":"https://orcid.org/0000-0002-4008-8292"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenfen Liu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","Zhengzhou Institute of Information Science and Technology, Zhengzhou 450002, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","institution_ids":[]},{"raw_affiliation_string":"Zhengzhou Institute of Information Science and Technology, Zhengzhou 450002, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101675076"],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.0791,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.81992129,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2014","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8844000101089478,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8844000101089478,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.8819000124931335,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.8586999773979187,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6788617372512817},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.6344088315963745},{"id":"https://openalex.org/keywords/tsallis-entropy","display_name":"Tsallis entropy","score":0.6006088852882385},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5458136796951294},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5375871658325195},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5210391879081726},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5174182653427124},{"id":"https://openalex.org/keywords/bayesian-inference","display_name":"Bayesian inference","score":0.5168469548225403},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5080981254577637},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.45854973793029785},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4238240718841553},{"id":"https://openalex.org/keywords/posterior-probability","display_name":"Posterior probability","score":0.41916584968566895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30914121866226196},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12915560603141785},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.11827287077903748},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09544822573661804}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6788617372512817},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.6344088315963745},{"id":"https://openalex.org/C117521176","wikidata":"https://www.wikidata.org/wiki/Q7849341","display_name":"Tsallis entropy","level":3,"score":0.6006088852882385},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5458136796951294},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5375871658325195},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5210391879081726},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5174182653427124},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.5168469548225403},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5080981254577637},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.45854973793029785},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4238240718841553},{"id":"https://openalex.org/C57830394","wikidata":"https://www.wikidata.org/wiki/Q278079","display_name":"Posterior probability","level":3,"score":0.41916584968566895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30914121866226196},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12915560603141785},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.11827287077903748},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09544822573661804},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2014/649392","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/649392","pdf_url":"https://downloads.hindawi.com/journals/js/2014/649392.pdf","source":{"id":"https://openalex.org/S96783963","display_name":"Journal of Sensors","issn_l":"1687-725X","issn":["1687-725X","1687-7268"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Sensors","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b62e8375284a49caa3f35b8f4c63382e","is_oa":true,"landing_page_url":"https://doaj.org/article/b62e8375284a49caa3f35b8f4c63382e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Sensors, Vol 2014 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2014/649392","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/649392","pdf_url":"https://downloads.hindawi.com/journals/js/2014/649392.pdf","source":{"id":"https://openalex.org/S96783963","display_name":"Journal of Sensors","issn_l":"1687-725X","issn":["1687-725X","1687-7268"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Sensors","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.5299999713897705}],"awards":[{"id":"https://openalex.org/G7129907147","display_name":null,"funder_award_id":"(973 Program","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8652812116","display_name":null,"funder_award_id":"2012CB315905","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2134596443.pdf","grobid_xml":"https://content.openalex.org/works/W2134596443.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1825277958","https://openalex.org/W1974341519","https://openalex.org/W1977947323","https://openalex.org/W1983874169","https://openalex.org/W1988520084","https://openalex.org/W2036823834","https://openalex.org/W2039916876","https://openalex.org/W2085804273","https://openalex.org/W2119562457","https://openalex.org/W2147595926","https://openalex.org/W2333588920","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W51653785","https://openalex.org/W88131178","https://openalex.org/W3145273302","https://openalex.org/W1529069387","https://openalex.org/W4402530664","https://openalex.org/W3033856829","https://openalex.org/W2314430310","https://openalex.org/W4390489571","https://openalex.org/W2078267893","https://openalex.org/W3192946336"],"abstract_inverted_index":{"With":[0,115],"the":[1,10,33,40,55,74,81,87,95,104,116,122,135,145,157,163,170,185],"rapid":[2],"development":[3],"and":[4,45,85,109,173],"application":[5],"of":[6,25,42,76,97,119,124,137,147,165],"medical":[7],"sensor":[8],"networks,":[9],"security":[11],"has":[12,28],"become":[13],"a":[14,23,141],"big":[15],"challenge":[16],"to":[17,31,38,143,183],"be":[18],"resolved.":[19],"Trust":[20,36],"mechanism":[21],"as":[22,182],"method":[24,142],"\u201csoft":[26],"security\u201d":[27],"been":[29],"proposed":[30,158],"guarantee":[32],"network":[34],"security.":[35],"models":[37,159],"compute":[39],"trustworthiness":[41],"single":[43],"node":[44,72,166],"each":[46,138,148],"path":[47,125,149,177],"are":[48,100],"constructed,":[49],"respectively,":[50],"in":[51,62],"this":[52],"paper.":[53],"For":[54],"trust":[56,60,98,111],"relationship":[57],"between":[58],"nodes,":[59],"value":[61],"every":[63],"interval":[64],"is":[65,113,128,150],"quantified":[66],"based":[67],"on":[68],"Bayesian":[69],"inference.":[70],"A":[71],"estimates":[73],"parameters":[75],"prior":[77],"distribution":[78,89],"by":[79],"using":[80,103],"collected":[82],"recommendation":[83],"information":[84],"obtains":[86],"posterior":[88],"combined":[90],"with":[91],"direct":[92],"interactions.":[93],"Further,":[94],"weights":[96],"values":[99],"allocated":[101],"through":[102],"ordered":[105],"weighted":[106],"vector":[107],"twice":[108],"overall":[110],"degree":[112],"represented.":[114],"associated":[117],"properties":[118],"Tsallis":[120,126],"entropy,":[121],"definition":[123],"entropy":[127],"put":[129],"forward,":[130],"which":[131],"can":[132,160],"comprehensively":[133],"measure":[134],"uncertainty":[136],"path.":[139],"Then":[140],"calculate":[144],"credibility":[146],"derived.":[151],"The":[152],"simulation":[153],"results":[154],"show":[155],"that":[156],"correctly":[161],"reflect":[162],"dynamic":[164],"behavior,":[167],"quickly":[168],"identify":[169],"malicious":[171],"attacks,":[172],"effectively":[174],"avoid":[175],"such":[176],"containing":[178],"low-trust":[179],"nodes":[180],"so":[181],"enhance":[184],"robustness.":[186]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
